Security Management
A list of selected real-world cyber security incidents is included below*.
Colonial Pipeline, May 2021
Nine Entertainment, March 2021
Marriot International, March 2020
Twitter, July 2020
Electronic Arts (E.A.), June 2021
Choose ONE of the above incidents and write a report analysing the cyber security incident. Your report must include the following information:
A brief overview of the incident
An explanation of who was affected by the incident
The nature and type of cyber attack
The severity of the cyber attack
Threat actors and their motivates (if any)
Any identified Indicators of Compromise (IOCs)
The elements of security that were compromised (i.e. the C.I.A. Triad)
The systems, data or users affected
The vulnerability or vulnerabilities exploited (if known)
Actions taken to control and prevent further damage
Lessons learned
Your report should follow the structure below:
Title/Section page
Introduction
Incident overview
Incident analysis
Lessons learned
Conclusion
References
You should aim for around 2000-2500 words for Part 1A
Based on all the available information from the incident in Part 1A, describe or outline a possible Cyber Kill Chain. You may wish to include any diagrams or illustrations to support your answer.
This should be a maximum of 350 words
Carrying out your own research on the Fastly Content Delivery Network (CDN) internet outage in June 2021.
Briefly explain the incident (maximum 100 words)
Discuss the incident response and disaster strategies that companies affected by this event should implement. (maximum 200 words)
Create a 'Business Continuity' Information Security policy document for the event (maximum 2 pages)
Answer the following questions about Security Management topics
Discuss the benefits of ISO/IEC 27001 certification.
Discuss and explain how an audit or what type of audit should be used for the chosen incident in Part 1A.
Outline a Risk Management process for the incident in Part 2.
The submission will be a ONE PDF file structured in the following sections:
Title Page
Include: the date, assignment name, module name and code, student first and last names and student ID number
Part 1A - Cyber Attacks
Part 1B - Cyber Kill Chain
Part 2 - Disaster Recovery and Business Continuity
Part 3 - Security Management Questions
References
All references must be in the appropriate Harvard referencing style
You must use a sufficient number of suitable scholarly references
Attachment:- Security Management.rar